MGT414: SANS® +S™ Training Program for the CISSP® Certification Exam
/
0 Comments
MGT414: SANS® +S™ Training Program for the CISSP® Certification Exam will prepare you to pass the CISSP® Certification Exam. This course is an accelerated review course that focuses solely on the ten domains of knowledge as determined by ISC2. Test-taking tips and strategies are also discussed.
FCC Approves the use of “White Space”, What is the Security Concern?
On September 23rd of 2010 the FCC approved the usage of “White Space” for wireless networking access. White Space is the frequency that are between television broadcast channels and many of them became free when TV broadcasters switched from analog signals to digital signals.
“White Space” and a Possible Security Concern
The FCC will be ruling on the usage of “White Space” for wireless networking access today (9/23/2010). White Space is the frequencies that are between television broadcast channels and many of them became free when TV broadcasters switched from analog signals to digital signals.
Stuxnet was a directed attack with insider knowledge expert says
Stuxnet appeared on the scene earlier this summer, though it was written more than a year ago. The code, its mechanics, the way it moved from system to system using Zero-Day vulnerabilities in Windows, everything about it was both frightening and shady. The hype given to it was justified, if only because it was a targeted payload, aimed at critical infrastructure.
Twitter Mouse-Over Flaw Send Users to Dangerous Links
Earlier in the day a security flaw turned Twitter's Website into a chaotic and potentially unsafe place, filled with annoying pop-up windows that activated just by rolling the mouse over another user's tweets.
FCC to make ruling on “White Space” usage.
On September 23rd the FCC will vote on a new set of rules that will finally allow their planned “super WiFi” to become reality.
In 2009 the FCC voted to open up the vast amounts of “white space” frequencies that lie between television broadcast channels.
The EnCase Evidence File Format
The EnCase evidence file can also be referred to as a forensic…
Creating a Comprehensive Vulnerability Assessment Program for a Large Company Using QualysGuard
ulnerability Assessment, according to wikipedia.org, is the process of
identifying and quantifying vulnerabilities in a system. Vulnerability assessment
can be used against many different types of systems such as a home security
alarm, the protection of a nuclear power plant or a military outpost. Note that
vulnerability assessment is different from risk assessments even though they share
some of the same commonalities. Vulnerability Assessment concerns itself with
the identification of vulnerabilities, the possibilities of reducing those
vulnerabilities and improving the capacity to manage future incidents. This paper
will focus primarily on vulnerability assessment as it pertains to information
technology infrastructure and how utilizing QualysGuard can ease the burden on
your technology staff.
‘Here You Have’ Worm Runs Wild Hitting U.S. Organizations Hard
Last week a hacker named, "Iraq resistance" who has been trying to unite other like-minded hackers in a cyber jihad effort towards US initiated a malicious computer worm know as the "Here you have" worm. A computer worm is a self-replicating malware computer program that uses computer networks to send copies of itself to other computers on a network without any user intervention.
Microsoft Security Bulletin Summary for September 2010 – Issued: September 14, 2010
With the release of the bulletins for September 2010, this bulletin
summary replaces the bulletin advance notification originally issued
on September 9, 2010. For more information about the bulletin
advance notification service, see
http://www.microsoft.com/technet/security/Bulletin/advance.mspx.